Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe
-
Size
254KB
-
MD5
f993316983e77de72f4b1c69b2f55096
-
SHA1
37b2d0b7712fe734364f063feb7281ee9a90dda7
-
SHA256
7beb18eb319097646049e624f9a4ff02976a8cd917603fe22d7f481616b3e91b
-
SHA512
1ba86ace045bbeb795de66527327d89f82778f4760ebf0241ddf22f3260187fdb4194d1c4760984e964df450712bf48c767027b5d680998269bfbf59cc9bcde9
-
SSDEEP
3072:j6b3Y3Fv+f02rtGxj4OwmKy+fv7IkRYMLW+mAXrRt8x6o7Piv2Piv2Piv2Piv:jsI1mztGSH7I8YMLx32ppp
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 dplaysvr.exe -
Loads dropped DLL 3 IoCs
pid Process 2056 f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe 2056 f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe 2108 dplaysvr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2108 dplaysvr.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2056 f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe 2108 dplaysvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2108 2056 f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2108 2056 f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2108 2056 f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2108 2056 f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\f993316983e77de72f4b1c69b2f55096_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:2108
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- System Location Discovery: System Language Discovery
PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD564d2472358ebc2d3678cfaa13ae0d864
SHA1e7ca16f6aa793ad7d2e94d7a3a08d28b77534b4e
SHA25633d203ad0a2a3265820f9e36b27f3041f6f8a89cc913512e6749f073b6952dfd
SHA5127a583bddd39ee2d2b96a3de260c48182dcc97c26a6ef6e21181ca7113e76a3d46d31fe3845a13fed2df216362abbd1f5b94d120a29e34464394327d485f8cd00
-
Filesize
35KB
MD537dcc8fccef1e4fba055f66e41358074
SHA127bf55f851d9f85fdcbc8aa1a4c0b10bf2a25d03
SHA256d702e77b2348cc50067f0896e0e6117b54cf7f1d79268b81171e51f5ead0665f
SHA512aee124411f19ccd2f825bf61ad4332ee7b5366a881e1bd95bbee424ca6bd299744839a8bc3f28d79401f1eaca81d6423212bf8a35443aec40338fd95008a6371
-
Filesize
884B
MD553c2b14b258594b29d3d8aa172e93e66
SHA1bec86a56ce8280abfb196a725db751c3be36c554
SHA2562c7c7f676a02b7b09b66e3be5c99e22b59f14955c5eaa0c12ba3b4d80d527015
SHA5122ecf62675d5c74d681010beb65a55555266ad067dde01ae57ec3db0d551df9d8160c50d2b6f9a6a0f44a7bea9ed6744dc95e69ebadfb4b35f46191ef1cfabaa7